Free 312-50v13 Exam Braindumps (page: 20)

Page 19 of 79

Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API.

Which of the following tools is used by Wilson in the above scenario?

  1. Factiva
  2. ZoomInfo
  3. Netcraft
  4. Infoga

Answer(s): D



David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities.

Which phase of the vulnerability-management life cycle is David currently in?

  1. Remediation
  2. Verification
  3. Risk assessment
  4. Vulnerability scan

Answer(s): A



Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.

Which of the following cloud attacks did Alice perform in the above scenario?

  1. Cloud cryptojacking
  2. Man-in-the-cloud (MITC) attack
  3. Cloud hopper attack
  4. Cloudborne attack

Answer(s): C



Judy created a forum. One day, she discovers that a user is posting strange images without writing comments. She immediately calls a security expert, who discovers that the following code is hidden behind those images:



What issue occurred for the users who clicked on the image?

  1. This php file silently executes the code and grabs the user’s session cookie and session ID.
  2. The code redirects the user to another site.
  3. The code injects a new cookie to the browser.
  4. The code is a virus that is attempting to gather the user’s username and password.

Answer(s): A






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts